indetectables-net / teorias-numeradas
Mirror de las teorias numeradas del sitio de Narvaja
☆17Updated 8 months ago
Alternatives and similar repositories for teorias-numeradas:
Users that are interested in teorias-numeradas are comparing it to the libraries listed below
- Conjunto de manuales para reversa/analisis/cracking☆57Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year
- RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS☆24Updated last year
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- ☆134Updated 2 years ago
- Execute shellcode files with rundll32☆197Updated last year
- C2☆94Updated 2 weeks ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆155Updated 6 months ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆83Updated 2 weeks ago
- ☆326Updated 2 months ago
- AV bypass while you sip your Chai!☆219Updated 10 months ago
- A simple Sleepmask BOF example☆95Updated 7 months ago
- A basic emulation of an "RPC Backdoor"☆239Updated 2 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆282Updated 10 months ago
- Different methods to get current username without using whoami☆174Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- ☆214Updated last year
- A Tool that aims to evade av with binary padding☆147Updated 9 months ago
- ☆238Updated last year
- random code snippets, useful for getting started☆119Updated 4 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆265Updated last month
- Neton is a tool for getting information from Internet connected sandboxes☆92Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆175Updated 2 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆490Updated last year